Chapter 122: Private Message
Chapter 122: Private Messages
Xiang Kun knows that in the eyes of many people outside the industry, hackers are the most NB programmers.
Generally, the one with the title of "guest" is the king, what hacker is a red guest and a white hacker, and the one with the title of "division" is a master, and what engineer architect, when he has a title with a "member", it is all silk......
But in fact, there is no difference between top programmers and top hackers, but the fields they specialize in and are good at are different, one is trying to meet and implement the requirements and build the system, the other is racking their brains to dig and exploit vulnerabilities and hacking the system, one is studying the building and the other is studying security.
There is also no complete boundary between the two, the hacker itself is a subset of subordinate programmers, and programmers can also become hackers at any time.
It's just that the direction of interest and specialization is different.
When Xiang Kun was in middle school, he was once very obsessed with the handsomeness of hackers in film and television dramas, fantasizing that he hacked computers all over the world, hiding behind the screen and controlling everything, and being the mastermind behind the scenes. Occasionally, I'll follow the tutorial to hack a few bad passwords.γPoorly maintained websites.,But I didn't actually do anything.,It's basically a walk.,Snoop around.,Leave a txt or jpg file to say it's just a trip here.,It's just a very vegetable script kid.γ
The current Xiang Kun is no stranger to terms such as SQL injection, cross-site scripting, buffer overflow, heap spraying, etc., and he also knows the principles, but he can't do it for a while when he is asked to attack and invade specific targets. Not only are there differences in thinking habits, but also differences in the understanding and application habits of many loopholes, as well as the lack of other large accumulations, such as a lot of spare broilers, reserved back doors, social worker pools of different levels, and special tools written by themselves or others, etc., which cannot be done all at once.
Of course, top hackers, while powerful, are not omnipotent.
Just like someone wants to enter your house, they generally don't just take a hammer to smash the door, or disguise themselves as a courier, check the water meter, collect electricity bills, repair computers, or deliver takeaways...... Either you take advantage of the imperfection of security and the problem of building structure when you are not going out, or when you are sleeping, sneak in through the window, open the lock with the master key and sneak in, or even follow you obscenely when you go home from grocery shopping and enter the house with you.
Even if you don't open the door, they can pretend to be your identity, help you receive couriers at your doorstep, and also send couriers and order takeout in your name.
Unless you blow up the road outside your house, it's really sad to be worried about it all the time.
But the premise of all this is that they know the real address of your home.
On the Internet, the most important information is the IP, which represents your location, and the MAC address is your "name", just like someone who finds out that you are staying in a certain hotel, and has to know your name to find out which room you are in and catch you.
The world is so big, if you don't interact with people, there are no clues exposed, and certain people may not be able to find you, because they don't know that you are the person they are looking for.
But now, Xiang Kun has to take the initiative to "send packages" to people who may have malicious intentions towards him and have the ability to track him, so he must be cautious and prepared.
The router of the cafΓ© is like the doorman who collects the express mail at the door of a certain community, Xiang Kun asked the uncle to help him send a package in the name of Xiao Ming, the uncle found the postal brother and handed the package to him, and the postal brother handed the package to the errand boy A who contacted Xiang Kun according to the requirements, and the errand boy A handed over the package to the errand boy B as required.
Brother B took the package and handed it to an errand boy alliance, the errand brother alliance packed the package outside, and then handed it to brother C, brother C only knew that the package was sent to xx city, so after delivery, he found brother D nearby in xx city to take over, brother D tore open a layer of packages, knowing that the next destination was xx street, so he found a little brother E near xx street to take over, and brother E tore a layer of packages and sent them to the front desk of a company on xx.
When the front desk of the company opened the final package, there was no address of the sender on it, and they wanted to send the package back to the sender, which could only be handed over to the little brother E.
Then the little brother E looked for the little brother D, and the little brother D gave it to the little brother C, and then handed it over to the little brother B and A after returning all the way, and sent it to the postal brother, and then went to the guard uncle's security room, and was taken away by Xiang Kun in the name of Xiao Ming.
So even if the front desk of the company is controlled by the "wicked person" and beats the little brother E who delivered the mail to death, the little brother E can't tell the sender's address, because he doesn't know at all, he only knows that it was given to him by the little brother D.
Of course, this method is not completely safe and untraceable.
For example, there are informants who have "wicked people" in the errand brother alliance, or the "wicked people" are ruthless, pay enough price and manpower, arrest and beat little brother D, and then arrest little brother C, and then know that little brother A and B are all arrested and beaten, and tortured one by one.
For example, if you put a locator in the package sent back, if Xiang Kun opens the package, the locator will start working.
For example, sending a truckload of packages to Xiang Kun made him have to spend a lot of time to carry them, giving them time to track them down.
But in the end, even if they learned from the postal brother that the final place to be sent was a certain community, they even found the doorman and learned that the person who sent the package was called Xiao Ming.
But their first reaction must have been to search the entire community to find this guy named Xiao Ming.
And after Xiang Kun, who was snooping on the side, found out, he directly took off the mask on his face, destroyed all the packages, and quickly retreated.
Xiang Kun had heard before that when the police investigated a hacker attack of a bad nature, the vice minister of public security personally supervised it, and in the middle of the night, the telecom operator partition pulled the gate to determine the location of the attack, and then the engineer drove the car with the protocol analysis equipment to access the computer room and the computer room, and the police uncle blocked the suspect's door before dawn.
Although it is judged that the other party has nothing to do with the official, Xiang Kun has always been accustomed to thinking about the imaginary enemy, and he will make a plan as if the other party can find his access IP.
When I was thinking about what I hadn't considered, Zhihu replied to a private message on "August Kasumi".
"You're a vampire too?
Xiang Kun had already thought about this problem, and replied: "You can starve more during the day than at night, and if you don't have blood to drink when you're hungry at night, you're prone to mania." β
When he thought about answering, he thought about how to prove his vampire identity without revealing his identity, and the less information he revealed, the better.
It's as if he didn't say anything about his baldness, molting, changing his teeth, getting stronger, or getting better eyesight, after all, he wasn't sure if the other "vampires" had the same changes as him, at least the "giant owl" hadn't lost its hair and become bald. Once he says that, he will likely let the other person know that he is bald, and this is an obvious trait.
"August Kasumi" replied:
"Are you afraid of garlic?"
"I'm not afraid, but I can't eat it, except for the water that I can drink, I can eat and vomit anything. There is no fear of crosses, nor are there any Buddha statues. β
"Wow! You're really a vampire! I'm so glad I've finally found one of my kind!"
Xiang Kun looked at the screen indifferently, and sneered in his heart: pretend, then pretend.
Then he replied, "yes, I'm so excited, too!
Kasumi in August: "Let's use QQ to chat, I'm afraid Zhihu's private message is not safe, maybe the administrator can see our chat!
Pippika Kachuchu: "What's your QQ number, I'll add you." β
Kasumi of August: "424423****"
Xiang Kun just wrote down this QQ number in his head, and he didn't even search for it, let alone open QQ, after a while, he replied: "Oops, I forgot my QQ password, I can't try it, forget it, just say it directly in Zhihu's private message, people shouldn't have time to peek into the chat between the two of us." β
Of course, he knows the purpose of the other party to use QQ to chat, chatting private messages on Zhihu, it is on Zhihu's server, and the other party's authority is relatively small, but when using QQ, it is easy to find the way of P2P, and then learn the IP of the other party to the chat, which is equivalent to removing the company's front desk when sending the package, and directly handing it over to the other party, and the little brother E who sent the package will be directly caught and beaten.
Of course, under Xiang Kun's heavy disguise, he used Tor to open QQ to chat with him, and it was not so easy to find out the real IP. It's just that Xiang Kun didn't prepare a new QQ number temporarily, and he didn't bother to change the way to toss.
After a while, August Kasumi replied: "Why don't you add a WeChat, what is your WeChat ID? Don't you tell me you can't remember the WeChat password again?"
Pippica Kachuchu: "What's your WeChat ID?"
Kasumi in August: "Hey, I'll ask first!"
Pippika Khachuchu: "Forget it, I think we'd better talk like this first, how did you become a vampire? When did you find out?"
Kasumi of August: "Why don't you have a gentlemanly demeanor at all?/ Poor expression." β
Pipicaka Chuchu: "I'm not a gentleman, and I'm not sure if you're the same kind yet. β
Kasumi in August: "Not sure why you sent me a private message?
Pipicaka Khachuchu: "So how the hell did you become a vampire, and when did you become one?"
Kasumi in August: "There are a lot of things I don't want to say in a private message, either add QQ, add WeChat, or call directly. β
Pipica Kachuchu: "What's your WeChat and phone number?"
Kasumi in August: "You're too guarded, aren't you, and you went to get a vest to send a private message??keep asking me for information, but you don't tell me about your situation?You want to know when and how I became a vampire, you have to tell your situation first?/ Angry expression. β
Pipicaka Chuchu: "You say it first, I'll tell you later." β
After a while, August's Kasumi let out a sigh and replied:
"Well, I became a vampire a month ago, and I don't know how I got there, but I woke up and suddenly did this. What about you, who was your first food?"
Xiang Kun raised his eyebrows, this reply revealed too much information, maybe so much that the other party didn't realize it.